Dynamic Source Routing

ABSTRACT In this technical paper a session based symmetric key cryptographic technique, termed as SBSKCT, has been proposed. This proposed technique is very secure and suitable for encryption of large files of any type. SBSKCT considers the plain text as a string with finite no. of binary bits. This input binary string is broken down into blocks of various sizes (of 2k order where k = 3, 4, 5, ….). The encrypted binary string is formed by shifting the bit position of each block by a certain values for a certain number of times and from this string cipher text is formed. Combination of values of block length, number of blocks and no. of iterations generates the session based key for SBSKCT. For decryption the cipher text is considered as binary string. Using the session key information, this binary string is broken down into blocks. The decrypted binary string is formed by shifting the bit position of each block by a certain values for a certain number of times and from this string plain text is reformed. A Universal Session Based Bit Level Symmetric Key Cryptographic Technique to Enhance the Information Security Manas Paul and Jyotsna Kumar Mandal

ABSTRACT In this technical paper a session based symmetric key cryptographic technique, termed as SBSKCT, has been proposed. This proposed technique is very secure and suitable for encryption of large files of any type. SBSKCT considers the plain text as a string with finite no. of binary bits. This input binary string is broken down into blocks of various sizes (of 2k order where k = 3, 4, 5, ….). The encrypted binary string is formed by shifting the bit position of each block by a certain values for a certain number of times and from this string cipher text is formed. Combination of values of block length, number of blocks and no. of iterations generates the session based key for...

You May Also Find These Documents Helpful

...Enhancement and Performance Evaluation of
Ad-hoc Routing Protocols for Rural Public Safety
Chad Bohannan, Li Zhang, Jian Tang, Richard S. Wolff, Shen Wan, Neeraj Gurdasani and Doug Galarus
Abstract—In this paper, we explore the feasibility of using
Mobile Ad-hoc Networks (MANETs) for rural public safety. First,
we discuss a QoS enhancement to a standard routing protocol,
DynamicSourceRouting (DSR). By incorporating a new routing metric and the available bandwidth and delay estimation
algorithms with DSR, we design a new routing protocol, QoSAware SourceRouting (QASR), to meet the QoS requirements
specified by Statement of Requirements (SoR) for public safety
communications. We then evaluate the performance of QASR
and the well-known standard routing protocols including Adhoc On-demand Distance Vector (AODV) and DSR based on
real public safety scenarios using the OPNET modeler at the
4.9GHz public safety spectrum band. Simulation results show
that QASR significantly outperforms DSR and AODV in terms
of various performance metrics.
Index Terms—Mobile ad-hoc networks, routing, QoS, public
safety, rural areas.
I. I NTRODUCTION
Providing responsive and effective public safety is particularly challenging in rural and sparsely populated areas, where
the lack of communication infrastructure, large distances and
difficult...

...IT220
Chapter 7
1.What’s a routing table? Keeps track of the routes to use for forwarding datat to its destination
2. What is the most common static route used in a host computer? Default gateway
3. What command is used to view a PC computer's routing table? Netstat –r /route prints
4. What is meant by a O.O.O.O network address entry with a subnet mask of 0.0. 0.0. in a PC's routing table? Default route
5. What is the 127.0.0.1 IP address and what is it used for?loopback, the data is routed directly back to the source
14. What is the difference between a static and a dynamicrouting protocol?Static routing protocol is of limited use for campuswide network routing but is essential when configuring the default route on router but dynamicrouting protocols enable the router’s routingtable to be dynamically updated toaccount for loss or canges in routes or changes in data traffic.
15. What are the four key issues in dynamicrouting protocols?Path determination, Metric, Convergence, Load Balancing
16. Define hop count.The number of routers the data packet must pass through to reach the destination network
17. Which of the following is not a metric used in dynamicrouting protocols
a. Hop count
b. Cost
c. Runs
d. Ticks
18. A distance vector protocol...

...Homework #4
Name _______________ Lab Day/Time____________
Cardiovascular Dynamics
This experiment examines the factors that effect blood flow through a blood vessel. The rate of
blood flow is influenced by the pressure gradient in the vessel, the radius of the vessel, the
viscosity of the blood and the length of the vessel. You will be asked to systematically examine
each of these factors to determine their effect on blood flow.
Getting Started:
 Login to a CAL lab computer using ZULU
 Open the PhysioEx program
 From the main menu, choose Cardiovascular Dynamics
 The program should open in the “Vessel Resistance” window, but if it doesn’t then you
should click Experiment and choose Vessel Resistance.
The experimental apparatus is a set of 2 fluid reservoirs connected by a “blood vessel”. It is
possible to vary the values of blood pressure, blood viscosity, vessel length and vessel radius by
clicking on the + and – buttons next to those parameters. Once your values have been chosen,
you can initiate blood flow between the reservoirs by clicking on the start button below the left
reservoir. The program will measure blood flow as a function of time and calculate a flow rate.
We will begin the experiment by varying vessel radius and observing its effects on the rate of
blood flow.
Flow as a function of Vessel Radius
Highlight the radius button in the data sets column (far left, bottom)
Set the following values:
...

...﻿DYNAMICSDynamics-is the degree of loudness or softness of sound.
It indicates the particular level of intensity in which a music or sound is to be played. Usually loud and intensified music creates great tension and soft music creates a feeling of calmness and tranquillity.
It makes music so expressive that may affect the listener’s mood.
Dynamics describe the volume, or how loud or soft the music is played; Italian terms for dynamics include forte (loud) and piano (soft).
Dynamics signs-are written above and below the notes that are to be played.
Dynamics signs
symbols
Italian term
English term
ppp
pp
p
mp
mf
f
ff
fff
>
<
pianississimo
pianissimo
piano
mezzo piano
mezzo forte
forte
fortissimo
fortississimo
decrescendo
creescendo
very ,very soft
very soft
soft
moderately soft
moderately loud
loud
very loud
very, very loud
gradually deacresing loudness
gradually increasing loudness
Words/phrases indicating changes of dynamics
al niente: to nothing; fade to silence. Sometimes written as n
calando: decreasing; becoming smaller
calmando: becoming calmer
crescendo: becoming louder
dal niente: from nothing; out of silence
decrescendo or diminuendo: becoming softer
fortepiano: loud and then immediately soft
fortissimo piano: very loud and then immediately soft
in rilievo: in relief (French en dehors: outwards);...

...Marketing Fall 2010
Individual Assignment 1
Date of Submission
Friday 8th October 2010
Time
5:00 pm
Marketing Fall 2010
Individual Assignment 1
SURVEYING CUSTOMERS
Kevin Kirkman wheeled his shiny blue BMW coupe into his driveway, put the gear shift into park, set the parking brake, and got out to check his mailbox as he did every day when he returned home. As he, flipped through the deluge of catalogs and credit card offers, he noticed a letter from Enterprise Rent-A-Car. He wondered why Enterprise would be writing him.
THE WRECK
Then he remembered. Earlier that month, Kevin had been involved in a wreck. As he was driving to work one rainy morning, another car had been unable to stop on the slick pavement and had plowed into his car as he waited at a stoplight. Thankfully, neither he nor the other driver was hurt but both cars had sustained considerable damage. In fact, he was not able to drive his car.
Kevin had used his cell phone to call the police, and while he was waiting for the officers to come, he had called his auto insurance agent. The agent had assured Kevin that his policy included coverage to pay for a rental car while he was having his car repaired. He told Kevin to have the car towed to a nearby auto repair shop and gave him the telephone number for the Enterprise Rent-A-Car office that served cars his area. The agent noted that his company recommended using Enterprise for replacement rentals...

...show commands: View routing table
Router#
22
Using show commands: View brief summary of interface configs
Router#
23
Using show commands: View detailed information on interfaces
Router#
Basic Routing Principles (8 points)
Static Routing
Question
Answer
24
When the IOS learns about a remote network and the interface it will use to reach that network, it adds that route to the ___ ___ (2 words) . . . .
25
as long as the ___ ___ (2 words) is enabled.
26
Static routes are denoted with the code ___ in the routing table.
27
List and describe three situations in which static routes should be used (use Answer cells 27, 28, and 29) for the three answers.
28
29
DynamicRoutingDynamicrouting protocols are used by routers to share information about the reachability and status of remote networks. Dynamicrouting protocols perform several activities.
Question
Answer
30
____ ___ (2 words), which is a routing protocol’s ability to share information about the networks it knows about with other routers that are also using the same routing protocol.
31
____ routing tables, which is a routing protocol’s ability to compensate for any topology changes without involving the network administrator.
...

...

 
Identify a router as a computer with specialised hardware and operating system designed for routing Give a router a basic configuration including IP addresses Routing tables Router activities – finding the best paths and switching packets
 

 

Connect networks together Find best routes Switch packets from one network to another Do this efficiently 24/7 Provide security by permitting or denying specified types of packet Provide quality of service by prioritising packets

 


CPU: control unit handles instructions, ALU for calculations RAM: volatile working storage ROM: permanent storage for POST and startup instructions Operating System: software that runs the computer System bus, Power supply



Long term storage is Flash and NVRAM, not hard disk Range of different interfaces all on different networks No input/output peripherals. Connect via a console PC and use PC’s keyboard and screen

 
   
Dynamic random access memory: as in a PC Temporary memory while the router is on Loses content when the router loses power or is restarted Holds running configuration Holds routing tables Holds ARP cache Holds fast-switching cache etc.

 
Non-volatile RAM: keeps its contents when the router is off Stores the startup configuration file When you have configured a router, you must save your configuration to NVRAM if you want...